A., Loske. (2015). IT security risk management in the context of cloud computing. Darmstadt, Germany: Springer Viewer.
Ahram, T. Z., et Nicholson, D. (2018). Advances in human factors in cybersecurity 2018. Springer, 2018.
Al Harrack, M. (2021). Cybesecurity risks in outsourcing strategies. Academia Letters, Art 4161. https:/doi.org/10.20935/AL4161.
AlDaajeh, S., Saleous, H., Barka, E., Breitinger, F. et Choo, K. R. (2022). The role of national cybersecurity strategies on the improvement of cybersecurity education. Computer & Security, Vol 119-102754. https://doi.org/10.1016/j.cose.2022.102754
Allhoff, F., Henschke, A., and Strawser, B. J. (eds.). (2016). Binary Bullets. The ethics of cyberwarefare. Oxford University Press.
Azzeh, M., Altamimi, A. M. et Atallah Aloudat, M. (2022, 09). Adopting the cybersécurity concept into curriculum. The potential effects on students cybersécurity knwoledge. DOI:10.48550/arXjv.10407. Édité par Researchgate.net.
Barat-Ginies, O. (2014). Existe-t-il un droit international du cyberespace ? Herodote, 2014/1, 201-220.
Bartsch, M., et Frey, S. (2018). Cybersecuritu best practices. LÖsungen zur Erhôhung cyberresilienz fur unterhement und behôrden. Springer.
Cabriol, M. (2022). Cyber-Espionnage ; les opérations chinoises montent en puissance contre les intérêts français. La Tribune, 2022, 10/10.
Chmielewski, S. (22/10/22). Le futur de l’identité et des accès : pour une gestion de l’identité numérique agile et de confiance. Aviable at https://www.linkedin.com/pulse/ le-futur-de-lidentit%25C3%25A9-et-des-acc%25C3%25A8s-b%25C3%25A2tir-une-gestion-chmielewski/?trackingId=6QcrcNBvG96p3FmXREiFgA%3D%3D
Clough, J. (2013). Principes of cybercrime. Cambridge University Press.
Cybermalveillance France. Aviable at https://www.cybermalveillance.gouv.fr/tous-nos-contenus/bonnes-pratiques/10-mesures-essentielles-assurer-securite-numerique
Czuryk, M. (2022). Supervision and inspection in the field of cybersecurity. In: Karpiuk, M., Kostrubiec, J. (eds.). The public dimension of cybersecurity. Maribor, Slovenia: Lex Localis.
Dehghantanha, A., Conti, M. et Dargahi, T. (2018). Cyber Threat Intelligence. Springer, advances in Information Security 70.
Delville, T (30/10/2022). Aviable at https://www.wedemain.fr/securite-resilience/ 60-des-entreprises-victimes-de-cyberattaque-deposer
Distler, D., et Hornat, C. (2007). Malware analysis: an introduction. Sans Reading Room's Research Paper. Aviable at https://www.giac.org/research-papers/2103/
Groupe Pandaros (2021). Cybers&curité, Methode de gestion de crise. VA Editions, Col. Guerre de l'Information.
Eriksson, J., Giacomello, G. (2007). Internationale relations and security in the digital age. Routledge.
Fadia, A., Nayfeh, M. et Noble, J. (2020). Follow the leader: how governments can combat intensifying cybersecurity risks. MacKinsley. Aviable at https://www.mckinsey.com/~/media/McKinsey/Industries/Public%20and%20Social%20Sector/Our%20Insights/Follow%20the%20leaders%20How%20governments%20can%20combat%20intensifying%20cybersecurity%20risks/Follow-the-leaders-How-governments-can-combat-intensifying-cybersecurity-risks-F.pdf
Ferens, A. (2021). Cybersecurity and cyber risk in integrated and management reports of key service operators. Theorical Journal of Accounting, Vol 45/2, 31-50.
Gigerenzer, G. (2004). Dread risk, september 11, and fatal traffic accidents. Psychological Science, 15, Nо 4, 286-287.
Green, J. A. (2015). Cyber warfare. A multidisciplinary analysis. Routledge.
Helbing, D. (2013). Globally networked risks and how to respond. Nature, Issue 497, 51-59. Aviable at: https://doi.org/10.1038/nature12047
Hepple, B. (2005). Labour laws and global trade. Hart Publishing.
Jajodia, S., Shakarian, P., Subrahmanian, V. S., Swarup, V., Wang, C. (2015). Cyber warfare. Building the scientific fundation. Springer.
Jajodia, S., Kant, S. (2014). Secure cloud computing. Springer.
Kaczmarek, K. (2022). Digital competencies of the general public and the state’s vulnerabilities to cyberspace treats. In: Karpiuk, M., Kostrubiec, J. (eds.). The public dimension of cybersecurity. Maribor, Slovenia: Lex Localis.
Karpiuk, M., et Kostrubiec, J. (2022). The public dimension of cybersecurity. Maribor, Slovenia: Lex Localis. Aviable at https://www.researchgate.net/publication/362656795.
Kendall, K., et McMillan, C. (2007). Practical malware analysis. Black Hat Conference. USA.
Kittichaisaree, K. (2017). Public International law of cyberspace. Springer.
Kizza, J. M. (2014). Network Security ans Cyber Ethics. 4 Ed. McFarland & Cie.
Kshetri, N. (2010). The global cybercrime industry. Springer.
Lee, N. (2015). Counterterrorism and cybersecurity. Total information awarneness. 2 Ed. Springer.
Loske, A. (2015). IT Security Risk Management in the context of cloud computing. Springer.
Marczcyk, M. (2018). Cyberprzestrzen jako nowy wymiar aktywnosci czlowieka - Analiza Pojectciowa obszaru. Przeglad Teleinformatyczny, 1-2, 59-72.
Martre, H. (1994). Rapport sur l'Intelligence Economique. La Documentation Française.
Mhalla, A. (2022). Il est temps de nous préparer aux cyberguerres. Le Figaro, 14. 10. 2022.
Moallem, A. (2018). Cybersécurity awarness among college students. In: Ahram, T. Z. et Nicholson, D. (eds.). Advances in human factors in cybersecurity. Springer.
Nicholson, D. (ed.). (2016). Advances in Human Factors in cybersecurity, 2016. Springer.
Nicholson, D. (ed.). (2017). Advances in human factors in cybersecurity, 2017. Springer.
Numérama, 2/11/2022. Aviable at https://www.numerama.com/cyberguerre/1167442-les-hackers-criminels-russes-peuvent-etre-tranquilles-moscou-ne-les-arretera-jamais.html.
Obaidat, M. S., Traore, I., Woungang, I. et al. (2019). Biometric based physical and cybersecurity systems. Springer.
Pieczywok, A. (2022). Cybersecurity and school-age young people. Challenges and threats. In: Karpiuk, M., Kostrubiec, J. (eds.). The public dimension of cybersecurity. Maribor, Slovenia: Lex Localis.
Pilzo, W.(2022). Management in cyberspace : from firewall to zero trust. In: Karpiuk, M., Kostrubiec, J. (eds.). The public dimension of cybersecurity. Maribor, Slovenia: Lex Localis.
Richards, J. (2017). Cyber-War. The anatomy of the global security threat. Palgrace Macmillan.
Rougé, J. F. (2020). La petite entreprise: un sanctuaire face à la cyberguerre ! Comment en finir avec ce mythe dangereux? Aviable at: https://www.researchgate.net/publication/340600332_La_petite_entreprise_un_sanctuaire_face_a_la_cyberguerre_Comment_en_finir_avec_ce_mythe_dangereux
Schmitt, M. N. (2013). Tallinn Manual on the international law applicable to cyber warefaire. Cambridge University Press.
Shackleford, D. (2015). Who is Using cyberthreat intelligence and how? Aviable at https://www.sans.org/reading-room/whitepapers/analyst/cyberthreat-intelligence-how-35767.
Sikos, L. F. (ed.). (2019). AI in cybersecutity. Springer.
Skopick, F. (ed.). (2018). Collaborative cyber Threat Intelligence. Detecting and responding to advanced cyber attacks at the national level. CRC Press, Taylor & Francis Group.
Springer, P. J. (2015). Cyber warfare. A reference handbook. ABC-CLIO.
StealthLabs. (2020). Cybersecurity Threats and attacks: all you need to know. Aviable at https://www.stealthlabs.com/blog/cyber-security-threats-all-you-need-to-know/
Taddeo, M., Glorioso, L. (eds.). (2017). Ethics and policies for cyberopérations. A NATO cooperative Cyber Defence Center of Excellence. Springer.
Taliharn, A.-M. En quête de la cyberpaix : gérer la cyberguerre par la coopération internationale. Aviable at https://www.un.org/fr/chronicle/article/en-quete-de-la-cyberpaixgerer-la-cyberguerre-par-la-cooperation-internationale
Tyrawa, D. (2022). The axiological and legal aspects of multi-faceted nature of cybersécutity. In: Karpiuk, M., Kostrubiec, J. (eds.). The public dimension of cybersecurity. Maribor, Slovenia: Lex Localis.
Voig, P., von dem Bussche, A. (2017). The EU General Data Protection Regulation. A practical guide. Springer.
Willcocks, L. P., et Lacity, M. (2012). The new IT outscourcing landscape. From innocation to cloud services. Palgrave Macmillan.
Yager, R. R., Reformat, M. Z., Alajlan, N. et al. (2015). Intelligent methods for cyber warfare. Springer.